Here is today’s federal cybersecurity and information technology news: IBM and the Lawrence Livermore National Laboratory are working together on the Vulcan supercomputer to analyze data for developing new technologies in applied energy, green energy, manufacturing, data manageme...

We recently wrote about TechAmerica and their activities related to Big Data in the Public Sector. A Big Data Task Force in TechAmerica’s public sector group has kicked off a collaborative activity in a Big Data Task Force.
There has been a new development in domain. The foundation a...

The New York Times revealed June 1st what many experts had already asserted regarding the United States role in the Stuxnet attack. While speculation of U.S. involvement complicated international relations on cyber conflict, an acknowledgement of U.S. involvement in a forum such as the...

Here is today’s federal cybersecurity and information technology news: The Defense Advanced Research Projects Agency’s Plan X is reaching out to the private sector and universities to develop an operating system capable of launching cyber attacks and surviving counterattack...

GovLoop, the social knowledge network for public sector professionals, is one of the most virtuous members of the Gov2.0 ecosystem. Their support of the community demonstrates, on a daily basis, their dedication to a simple mission: They want to connect government to improve government...

This year at Splunk Live, CTOvision editor and Crucial Point CTO Bob Gourley provided a keynote on predicting the future of information technology, outlining some of his methods and what we can learn from each.

Today’s federal cybersecurity and information technology news: The U.S. Office of Naval Research is partnering with Chilean scientists to develop a mobile application to provide information helpful in countering pirates, arms traffickers, and illegal fishermen. More here. The Arm...

Today’s federal cybersecurity and information technology news round-up: The proposed Social Networking Online Protection Act (SNOPA) would make it illegal for employers to demand access rto social media accounts. More here. The Defense Advanced Research Projects Agency has reques...

Study after study refutes the myth that cybersecurity is compromised by malicious, brilliant hackers. Advanced persistent threats, state-sponsored hackers, and foreign intelligence agencies are serious threats, especially to major targets, but the vast majority of breaches and leaks re...

Good news for Big Data users: Cloudera recently released the second and final beta for Cloudera’s Distribution Including Apache Hadoop version 4 (CDH4), meaning that the official CDH4 release is coming soon. If you aren’t already using CDH, Cloudera offers the leading open-source...

Dion Hinchcliffe of Dachis Group is one of the brightest minds in the nation today. For years he has helped individuals and organizations think through complex challenges. And for years he has proven he can glean trends and impart their relevance to decision-makers. He is world renowne...

One of the sessions I attended at FOSE 2012 was titled: “What the Research Shows: The Future of Mobile.” It featured two researchers, Dr. David Metcalf of the University of Central Florida, and Aaron Smith, of the Pew Internet and American Life Project. These gentlemen focu...

The T in ETL, or the “transform” stage of “extract, transform, load” data process, rarely gets the spotlight in the Big Data revolution, but it’s one of the most challenging and important elements in turning raw data into intelligence.

The Department of Defense Intelligence Information Systems (DoDIIS) conference is held once a year by the Defense Intelligence Agency technology leadership team. This is an incredible event full of information-packed presentations and social sessions. One of its greatest features is a...

Yesterday, the White House demonstrated its support for Big Data in a huge way. Federal agencies have committed over $200M to big data initiatives in the future. Between the National Science Foundation, National Institute of Health, Department of Defense, Defense Advanced Research Proj...

On Thursday 29 March 2012 from 2:00pm to 3:30pm EDT the White House Office of Science and Technology Policy (OSTP) and the National Science Foundation (NSF) will hold an event focused on “Big Data” Research and Development.

Let’s get started, I’m not in love w/ the new naming system for the iPad. “New” should never be in any products name, let alone a real piece of technology (will the next one be New New? or New and Improved iPad?). Ridiculous.

Since the European ITSEC and US TCSEC product security evaluation mechanisms were merged into the Common Criteria in around 1998, lots of vendors’ product literature has sported EAL numbers regarding how well-tested their products are. What isn’t typically seen in such documents, thoug...

With the continued rise in home-based and mobile working, the possibility of people being forced to access and potentially modify data during encounters with ne’er-do-wells becomes a genuine security issue. For example, while there haven’t been many cases reported yet, the ...

Like my colleague Alex Olesker, I too attended Cloudera Day 2012. While there were many panels of interest, perhaps one of the most important was Amr Awadallah‘s talk about big data applications to business intelligence. Many CTOVision readers with backgrounds in the intelligenc...

CumuLogic is a cloud computing company founded by Sun Microsystems’ alumni. The company has developed a Java Platform-as-a-Service (PaaS) software that makes it easier and faster to develop and deploy Java applications (apps) in the cloud. By automating the management of the runtime en...

The Navy Marine Corps Intranet is the largest individual network in the world. The only larger network is the Internet. This huge network sprawl requires a great deal of strategy, concern and planning. Over 700,000 users rely on the intranet to receive IT services. This is a huge netwo...

On 26 January 2011 government IT professionals, federally-focused systems integrators and IT vendors met in the Government Big Data Forum to dialog on issues of common concern on the topic of overwhelming data. This event, sponsored by Carahsoft, included presentations, discussions, pa...

Alistair Croll of Bitcurrent, an analysis and research firm, set out to explain all about the cloud. A big cloud advocate myself, I was interested in hearing his thoughts, and hopefully gaining some tips and tricks along the way.
Alistair first highlighted Nicholas Carr’s “The Big...

With this post I would like to bring your attention to CTOlabs.com
The purpose of the CTOlabs site is to provide a venue for providing technology concepts and reviews which highlight some of the commercial capabilities of Crucial Point LLC (CTOlabs.com is a subsidiary of Crucial Poin...

The CTOvision.com assessment of the Oracle Acquisition of Sun: This is positive for the enterprise IT across the board, but the biggest determinate of what it means for your enterprise is what decisions you make now. If you are an enterprise CTO, the ball is in your court.
The follow...

The Apple iTablet or iSlate is due to be shown off to the world January 27th, and unleashed on us sometime in March. The blogosphere has been buzzing about the topic. Joe Wilcox of BetaNews.com said “The world doesn’t need an Apple Tablet, or any other” (full post ...

Most enterprise technologists should see a continued payoff of the hard work in planning, architecture, documentation, development and configuration work that has been occurring over the last several years. Enterprise technologists were building Service Oriented Architectures (SOA) lo...

2010 will bring a load of new gadgets, technology, and advancements for consumers and enterprises alike. Microsoft is releasing Office 2010, Apple is releasing their new Tablet (iTablet), NVIDIA is releasing their “GeForce 3XX” series of graphics cards, SSD’s will be...

2010 will undoubtedly be a year of technology innovation. In 2009, Twitter revolutionized the way we get news, it brought us closer to those who were a part of the news, almost making traditional media irrelevant. I don’t know who (or what) will be the Twitter of 2010, but below...

Dear readers,
The Federal Trade Commission, a cadre focused on protecting America’s consumers, has issued new guidance governing endorsements and testimonials of products, including comments made by bloggers. Like most rules, I think the rules in this guidance were devised beca...

Adobe Flex is a software development approach and environment which enables the production of cross-platform Rich Internet Applications. Adobe Integrated Runtime (AIR) is the cross-platform runtime environment used by Flex (as well as Flash, HTML, JavaScript and AJAX) for deployment o...

A year and a half ago I pulled together several thoughts on Cyber Deterrence which had come out of years of dialog on the cyber threat. I wanted to capture some key challenges since in my view many were making foolish assumptions regarding what our nation should do in the domain of cyb...

Planning continues for the 16-18 Nov 2009 National Security Technology Summit (Philadelphia, PA).
It has been exciting to work with friends like Nancy Wheeler of GETA as the conference agenda comes together. There are still a few segments we are not ready to go fi...

If your focus is on Federal IT you have no doubt long realized there are an incredible number of conferences and events in this domain. As an aid to long range planning I’ve built a public calendar titled the Federal Technology Events Calendar. This calendar uses Google Calend...